General

  • Target

    0fb1d11732acd516de3da578ac8d7a4a0f51684f588898bc0621fe5424cef0eb.jar

  • Size

    64KB

  • Sample

    240510-kavw4acf8y

  • MD5

    8f32b6ad5a4b0bf593c5e8cfe8afd04b

  • SHA1

    02623723f9a9af013df424336d45ada46abe9472

  • SHA256

    0fb1d11732acd516de3da578ac8d7a4a0f51684f588898bc0621fe5424cef0eb

  • SHA512

    185bb366786dc1a1a54dcb623341f7a727842685aa50d48dcc4bafe5135feaa1f6294a874faa55fdc91816a43bd60ab543c9284b7eec97d8cedf65dd62de282c

  • SSDEEP

    1536:sFVl2U0Gg0HxEjXu28Gut9+gnzqYgMYw0Sr8awyvI0cNFl:sFv2U0GXUu28P7HZY84awyv3cNFl

Malware Config

Extracted

Family

strrat

C2

elastsolek21.duckdns.org:4781

zekeriyasolek45.duckdns.org:4781

Attributes
  • license_id

    WFC9-W4KB-388F-9KY1-S6JV

  • plugins_url

    http://jbfrost.live/strigoi/server/?hwid=1&lid=m&ht=5

  • scheduled_task

    true

  • secondary_startup

    true

  • startup

    true

Targets

    • Target

      0fb1d11732acd516de3da578ac8d7a4a0f51684f588898bc0621fe5424cef0eb.jar

    • Size

      64KB

    • MD5

      8f32b6ad5a4b0bf593c5e8cfe8afd04b

    • SHA1

      02623723f9a9af013df424336d45ada46abe9472

    • SHA256

      0fb1d11732acd516de3da578ac8d7a4a0f51684f588898bc0621fe5424cef0eb

    • SHA512

      185bb366786dc1a1a54dcb623341f7a727842685aa50d48dcc4bafe5135feaa1f6294a874faa55fdc91816a43bd60ab543c9284b7eec97d8cedf65dd62de282c

    • SSDEEP

      1536:sFVl2U0Gg0HxEjXu28Gut9+gnzqYgMYw0Sr8awyvI0cNFl:sFv2U0GXUu28P7HZY84awyv3cNFl

    • STRRAT

      STRRAT is a remote access tool than can steal credentials and log keystrokes.

    • Drops startup file

    • Modifies file permissions

    • Adds Run key to start application

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

MITRE ATT&CK Enterprise v15

Tasks